US20170303131A1 - System and method for location-based security - Google Patents
System and method for location-based security Download PDFInfo
- Publication number
- US20170303131A1 US20170303131A1 US15/635,720 US201715635720A US2017303131A1 US 20170303131 A1 US20170303131 A1 US 20170303131A1 US 201715635720 A US201715635720 A US 201715635720A US 2017303131 A1 US2017303131 A1 US 2017303131A1
- Authority
- US
- United States
- Prior art keywords
- mobile computing
- computing device
- rfid
- proximity signal
- rfid reader
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/023—Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/1633—Constructional details or arrangements of portable computers not specific to the type of enclosures covered by groups G06F1/1615 - G06F1/1626
- G06F1/1684—Constructional details or arrangements related to integrated I/O peripherals not covered by groups G06F1/1635 - G06F1/1675
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/1633—Constructional details or arrangements of portable computers not specific to the type of enclosures covered by groups G06F1/1615 - G06F1/1626
- G06F1/1684—Constructional details or arrangements related to integrated I/O peripherals not covered by groups G06F1/1635 - G06F1/1675
- G06F1/1698—Constructional details or arrangements related to integrated I/O peripherals not covered by groups G06F1/1635 - G06F1/1675 the I/O peripheral being a sending/receiving arrangement to establish a cordless communication link, e.g. radio or infrared link, integrated cellular phone
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/28—Supervision thereof, e.g. detecting power-supply failure by out of limits supervision
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0723—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10118—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the sensing being preceded by at least one preliminary step
- G06K7/10128—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the sensing being preceded by at least one preliminary step the step consisting of detection of the presence of one or more record carriers in the vicinity of the interrogation device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10366—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H04W4/008—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Definitions
- the present disclosure relates to a system and method for enabling and controlling the operation and/or execution of certain hardware and software components of a mobile computing device according to information obtained based on the use of radio frequency identification (RFID).
- RFID radio frequency identification
- RFID implementations are built around the concept of tracking the physical location of an asset (e.g., a product such as a mobile computing device) having an RFID tag affixed thereto.
- the RFID tag is read by a radio frequency (RF) reader.
- RF radio frequency
- the asset is not self-aware of its RFID-based location as all location information is exchanged between the RFID tag and the RFID reader(s).
- An exemplary embodiment of the present disclosure provides a mobile computing device, including: a first memory device having first computer-readable instructions tangibly recorded thereon; a first hardware processor configured to execute the first computer-readable instructions recorded on the first memory device; and an RFID component that includes a transceiver configured to receive a proximity signal from at least one RFID reader when the RFID component is within a predetermined range of the at least one RFID reader, and a second memory device configured to store the proximity signal, wherein the first hardware processor is configured to, upon executing the instructions recorded on the first memory device, control at least one operation of the mobile computing device in accordance with the proximity signal received by the transceiver of the RFID component from the at least one RFID reader.
- An exemplary embodiment of the present disclosure provides a method for controlling at least one operation of a mobile computing device, the method including: receiving, by a transceiver of an RFID component, a proximity signal from at least one RFID reader when the RFID component is within a predetermined range of the at least one RFID reader; storing the proximity signal in a first memory device of the RFID component; and executing, by a first hardware processor of the mobile computing device, first computer-readable instructions tangibly recorded on a second memory device of the mobile computing device, the executed instructions controlling the at least one operation of the mobile computing device in accordance with the proximity signal received by the transceiver of the RFID component from the at least one RFID reader.
- An exemplary embodiment of the present disclosure provides a non-transitory computer-readable storage medium storing instructions which, when executed by a hardware processor of a mobile computing device, cause the hardware processor to perform a method for controlling at least one operation of the mobile computing device, the method including: receiving a proximity signal from a transceiver of an RFID component communicatively connected to the mobile computing device, the transceiver receiving the proximity signal when the RFID component is within a predetermined range of at least one RFID reader; and executing, by the hardware processor of the mobile computing device, the instructions stored on the non-transitory computer-readable storage medium of the mobile computing device, the executed instructions controlling the at least one operation of the mobile computing device in accordance with the proximity signal received by the transceiver of the RFID component from the at least one RFID reader.
- An exemplary embodiment of the present disclosure provides a non-transitory computer-readable storage medium storing instructions which, when executed by a hardware processor located in an RFID component communicatively connected to a mobile computing device, cause the hardware processor to perform a method for controlling at least one operation of the mobile computing device, the method including: receiving, by a transceiver of the RFID component, a proximity signal when the RFID component is within a predetermined range of at least one RFID reader; storing the proximity signal in the non-transitory computer-readable storage medium of the RFID component, the non-transitory computer-readable storage medium of the RFID component having a control policy for the mobile computing device, the control policy including identifications of operations of the mobile computing device which are performable based on the received proximity signal; comparing the proximity signal to the control policy, determining which operations of the mobile computing device are permitted to be performed based on the comparison, and generating an operation signal identifying the operations of the mobile computing device which are determined to be performable; and transmitting the operation signal, to a second hardware processor of the mobile computing
- FIG. 1 illustrates a diagram of a system architecture that may be employed in accordance with an exemplary embodiment.
- FIG. 2 is a block diagram illustrating the hardware architecture of a mobile computing device in accordance with an exemplary embodiment.
- FIG. 3 is a block diagram illustrating the architecture of a RFID reader in accordance with an exemplary embodiment.
- FIG. 4 is a flow chart illustrating a method according to an exemplary embodiment.
- FIG. 5 is a flow chart illustrating a method according to an exemplary embodiment.
- FIG. 6 is a flow chart illustrating a method according to an exemplary embodiment.
- FIG. 7 is a chart illustrating exemplary functions performed by the devices of the system.
- FIG. 8 is a block diagram illustrating an exemplary architecture using a hypervisor.
- FIG. 9 is a block diagram illustrating an exemplary architecture using a hypervisor.
- FIG. 10 is a flow chart illustrating a method according to an exemplary embodiment.
- exemplary embodiments of the present disclosure provide a system and method of location-based security, in which RFID components 210 (e.g., RFID tags) removably or fixedly affixed to a mobile computing device 200 comprise microcontrollers (e.g., at least one hardware processor), and the communications infrastructure 206 (e.g., internal and external serial buses) of mobile computing devices 200 exchange location information between the RFID components 210 and the firmware and operating system(s) 232 of the mobile computing device 200 .
- RFID components 210 e.g., RFID tags
- microcontrollers e.g., at least one hardware processor
- the communications infrastructure 206 e.g., internal and external serial buses
- a mobile computing device 200 includes at least one hardware processor 204 configured to execute computer-readable programs and an operating system 232 tangibly recorded on a non-transitory computer-readable recording medium (“memory”) 208 (e.g., ROM, hard disk drive, optical memory, flash memory, etc.). Examples of a mobile computing device 200 include a laptop, tablet computer, smartphone, etc. as known in the art.
- memory e.g., ROM, hard disk drive, optical memory, flash memory, etc.
- FIG. 1 is a block diagram of components of a system for location-based security according to an exemplary embodiment of the present disclosure.
- the mobile computing device 200 is shown as having an RFID component 210 affixed thereto.
- the RFID component 210 may be removably or fixedly affixed to the mobile computing device 200 .
- the RFID component 210 may be comprised within the housing containing the electronic circuitry of the mobile computing device 200 .
- the RFID component 210 may have its own hardware processor 214 separate from the hardware processor(s) of the mobile computing device 200 .
- the RFID component 210 has its own non-transitory memory 212 (e.g., ROM, hard disk drive, optical memory, flash memory, etc.) separate from the memory 208 of the mobile computing device 200 , and a transceiver 220 .
- the RFID component 210 does not have its own hardware processor 214 , but contains the memory 212 and the transceiver 220 .
- the RFID component 210 may be passive, active, or battery-assisted passive.
- An active RFID component 210 has an on-board battery and periodically transmits a signal containing a data message (the message can include, e.g., identification information of the RFID component, etc.).
- a battery-assisted passive RFID component 210 has a small battery on board and is activated when in the presence of an RFID reader 100 .
- a passive RFID component 210 is cheaper and smaller because it has no battery; instead, the RFID component 210 uses the radio energy transmitted by the RFID reader 100 .
- the RFID component 210 contains at least two parts: an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, collecting DC power from the incident reader signal, and other specialized functions; and a transceiver 220 (e.g., antenna) for receiving and transmitting the signal.
- the transceiver 220 can include two antennas in different polarizations such as linear and circular or horizontal and vertical. A single antenna can also be used.
- the RFID component 210 can operate, for example, in a frequency range between 860 and 960 MHz.
- the sensitivity of the antenna is important to the operation of the RFID component 210 , and a minimum receive gain of the antenna greater than ⁇ 2 dB should be maintained to ensure proper operation.
- the antenna provides a roughly omni-directional radiation pattern. Due to regional banding of the ⁇ 900 MHz ISM frequency space, the antenna(s) may be regionally designed. For instance, the North American ISM band is 902-928 MHz. With a transmitter at 28 dBm complying with FCC and UHF RFID Gen2 Specifications, this should yield a free space range of approximately 20 meters.
- the RFID component 210 information (i.e. tag information) is stored in a non-volatile memory, e.g., memory 212 .
- the RFID component 210 includes either fixed or programmable logic for processing the transmission and sensor data, respectively.
- the RFID component 210 includes an Impinj MonzaX-8K Dura RFID integrated circuit or similar integrated circuit.
- FIG. 1 illustrates only one RFID reader 100 and RFID component 210 for clarity of illustration. However, it is to be understood that several RFID readers 100 may be equipped in a room or other area to which the mobile computing device may be carried.
- An RFID reader 100 transmits a radio signal, which may be encoded, to interrogate the RFID component 210 .
- the RFID component 210 receives the message from the RFID reader 100 and then responds with its identification information.
- FIG. 3 shows an exemplary architecture of an RFID reader 100 .
- the RFID reader 100 contains a non-transitory memory device 302 that can store the proximity signal (which can include the location data and/or a control policy), a hardware processor (e.g., CPU) 300 , and a transceiver 304 .
- the proximity signal which can include the location data and/or a control policy
- a hardware processor e.g., CPU
- the RFID reader(s) 100 send a proximity signal (e.g., location-related information includes, for example, geographic coordinates, configured zones, and/or proximity information)) to the RFID component 210 embedded within or affixed to the mobile computing device 200 , indicating the defined physical location of the RFID reader(s) 100 and/or the mobile computing device 200 .
- the location information can be transmitted to the RFID component 210 while the mobile computing device 200 is in both the powered-on and powered-off states.
- the message stored in the RFID component's memory 212 is accessed by the hardware processor 214 of the RFID component 210 .
- the hardware processor 214 serves three functions: 1) processes the location information provided by the RFID component 210 against corresponding control or management policies to determine the appropriate power state for the mobile computing device 200 ; 2) communicate with the power controls of the mobile computing device 200 to manage power states (e.g., force power off, enable power on, and disable power on); and 3) pass the location information to the mobile computing device's serial buses 206 .
- the RFID reader 100 can adjust its transmission frequency to avoid standard frequencies.
- FIG. 2 is a block diagram illustrating a mobile computing device 200 architecture in accordance with an exemplary embodiment.
- a person having ordinary skill in the art may appreciate that embodiments of the disclosed subject matter can be practiced with various computer system configurations, including multi-core multiprocessor systems, minicomputers, mainframe computers, computers linked or clustered with distributed functions, as well as pervasive or miniature computers that may be embedded into virtually any device.
- at least one processor device and a memory may be used to implement the above described embodiments.
- a hardware processor device as discussed herein may be a single hardware processor, a plurality of hardware processors, or combinations thereof. Hardware processor devices may have one or more processor “cores.”
- the terms “computer program medium,” “non-transitory computer readable medium,” and “computer usable medium” as discussed herein are used to generally refer to tangible media such as a memory device 208 , a memory device 212 , and a memory device 303 .
- Hardware processor 204 may be a special purpose or a general purpose processor device.
- Hardware processor 214 may be a special purpose or a general purpose processor device.
- hardware processor 300 may be a special purpose or a general purpose processor device.
- the hardware processor device 204 may be connected to a communication infrastructure 206 , such as a bus, message queue, network, multi-core message-passing scheme, etc.
- the network may be any network suitable for performing the functions as disclosed herein and may include a local area network (LAN), a wide area network (WAN), a wireless network (e.g., Wi-Fi), a mobile communication network, a satellite network, the Internet, fiber optic, coaxial cable, infrared, radio frequency (RF), or any combination thereof.
- the mobile computing device 200 may also include a memory 208 (e.g., random access memory, read-only memory, etc.), and may also include a memory 212 .
- the memory 208 and the memory 212 may be read from and/or written to in a well-known manner.
- the memory 208 and the memory 212 (and memory 302 ) may be non-transitory computer readable recording media.
- Data stored in the mobile computing device 200 may be stored on any type of suitable computer readable media, such as optical storage (e.g., a compact disc, digital versatile disc, Blu-ray disc, etc.), magnetic tape storage (e.g., a hard disk drive), or solid-state drive.
- An operating system 232 , one or more applications 234 , and one or more hypervisors 236 can be stored in the memory 208 .
- the data may be configured in any type of suitable database configuration, such as a relational database, a structured query language (SQL) database, a distributed database, an object database, etc.
- suitable configurations and storage types will be apparent to persons having skill in the relevant art.
- the mobile computing device 200 may also include a communications interface 224 .
- the communications interface 224 may be configured to allow software and data to be transferred between the mobile computing device 200 and external devices.
- Exemplary communications interfaces 224 may include a modem, a network interface (e.g., an Ethernet card), a communications port, a PCMCIA slot and card, etc.
- Software and data transferred via the communications interface 224 may be in the form of signals, which may be electronic, electromagnetic, optical, or other signals as will be apparent to persons having skill in the relevant art.
- the signals may travel via a communications path 226 , which may be configured to carry the signals and may be implemented using wire, cable, fiber optics, a phone line, a cellular phone link, a radio frequency link, etc.
- Computer program medium and computer usable medium may refer to memories, such as the memory 208 and the memory 212 , which may be memory semiconductors (e.g., DRAMs, etc.). These computer program products may be means for providing software to the mobile computing device 200 .
- Computer programs e.g., computer control logic
- Such computer programs may enable mobile computing device 200 to implement the present methods as discussed herein.
- the computer programs when executed, may enable hardware processor device 204 to implement the method illustrated by FIGS. 4-6 and 10 , or similar methods, as discussed herein. Accordingly, such computer programs may represent controllers of the mobile computing device 200 .
- the software may be stored in a computer program product or non-transitory computer readable medium and loaded into the mobile computing device 200 using a removable storage drive or communications interface 224 .
- the mobile computing device 200 may also include various hardware devices, such as a camera 216 , a microphone 218 , a peripheral interface 222 , and input/output ports 228 such as USB, firewire, thunderbolt ports, etc.
- the RFID component 210 may be located within and integrated with the mobile computing device 200 , or the RFID component 210 can be external to the mobile computing device 200 and connected thereto by a signal transmission means such as a wire(s), wireless communications, etc.
- the mobile computing device 200 may also include a display interface 202 that outputs display signals to a display unit 230 , e.g., LCD screen, plasma screen, LED screen, DLP screen, CRT screen, etc.
- a display unit 230 e.g., LCD screen, plasma screen, LED screen, DLP screen, CRT screen, etc.
- the location information provided through the mobile computing device's buses 206 can be integrated with either a hypervisor 236 or a native operating system 232 using a device driver.
- Hypervisors 236 allow for the control of hardware of the mobile computing device 200 and guest virtual machines. Location-based security can be integrated in the hypervisor control domain directly or be installed as a guest virtual machine that interfaces with the hypervisor control domain.
- Location-based security can be configured with rules to manage the hypervisor control domain using the desired automated response associated with various defined locations.
- Virtual machines, network interface cards, device power, USB ports, cameras, microphones, and other device hardware can be enabled or disabled based on defined policy rules.
- the hypervisor 236 is configured to further distribute the location information to guest virtual machines running on the host machine.
- the operating system(s) 232 of the mobile computing device 200 can receive RFID-based location information from either the serial buses 206 directly, if running as a native operating system 232 , or as a pass-through from the hypervisor 236 , if running on a guest virtual machine.
- the location-based security techniques of the present disclosure integrate with the operating system(s) 232 to control access to device hardware and device power states using the defined policy rules. Access to one or more applications 234 and one or more files stored or running on the operating system(s) 232 are also enabled or disabled using the device management functionality of the location-based security system and method of the present disclosure.
- a file can be, for example, a document, picture, video, database records, etc.
- FIG. 8 is a block diagram illustrating a hypervisor in accordance with an exemplary embodiment.
- the present disclosure leverages Hyper-V, for example, as its type 1 hypervisor.
- the exemplary architecture of FIG. 8 allows for multiple User VMs to be run in the future.
- the hypervisor is used to isolate the user VMs from hardware as defined in the control policy, ensure a secure networking environment and cryptographically isolate VMs from each other.
- a network VM can encapsulate both of the layers of encryption and have direct access to the network interface.
- FIG. 9 is a block diagram illustrating an exemplary architecture in which virtual systems management (VSM) can be used to dynamically manage hardware available to the User OS (USB devices, webcam, microphone, Bluetooth, etc.) and provide secure networking based on the policy issued over RFID.
- VSM virtual systems management
- the mobile computing device 200 includes the memory device 208 having computer-readable instructions tangibly recorded thereon.
- the mobile computing device 200 can also include a hardware processor 204 configured to execute the computer-readable instructions recorded on the memory device 208 .
- the mobile computing device 200 can also include an RFID component 210 that includes a transceiver 220 (e.g., an antenna) configured to receive a proximity signal from at least one RFID reader 100 when the RFID component 210 is within a predetermined range (e.g., within a couple feet or meters) of the at least one RFID reader 100 .
- a transceiver 220 e.g., an antenna
- the predetermined range can be configured based on (1) the processing and/or telecommunication capabilities of the mobile computing device 200 , RFID component 210 and/or RFID reader(s) 100 , ad/or (2) based on selectable distances (e.g., 10 feet, 20 feet, 30 feet) for specific control objectives, and/or (3) location restrictions such as the physical size of a room, building, or segment of a building (e.g., the second floor of the building).
- the mobile computing device 200 can also include a memory device 212 configured to store the proximity signal.
- the hardware processor 204 is configured to, upon executing the instructions recorded on the memory device 208 , control at least one operation of the mobile computing device 200 in accordance with the proximity signal received by the transceiver 220 of the RFID component 210 from the at least one RFID reader 100 .
- the hardware processor 204 is configured to control at least one of: (1) at least one hardware component (e.g., memory device 208 , display interface 202 , camera 216 , microphone 218 , peripheral interface 222 , communications interface 224 , ports 228 , etc.) of the mobile computing device 200 ; (2) at least one operating system 232 recorded on the memory device 208 ; (3) at least one hypervisor 236 recorded on the memory device 208 ; and (4) at least one application program 234 executable on the mobile computing device 200 .
- at least one hardware component e.g., memory device 208 , display interface 202 , camera 216 , microphone 218 , peripheral interface 222 , communications interface 224 , ports 228 , etc.
- the proximity signal includes a control policy including identifications of operations of the mobile computing device 200 that are performable (e.g., by the mobile computing device 200 ).
- the hardware processor 204 is configured to enable or disable access to at least one of an executable application 234 stored in the memory device 208 , a file stored in the memory device 208 , at least one operating system 232 of the mobile computing device 200 , and a peripheral hardware component (e.g., external hard drive, server, external disk drive, etc.) with which the mobile computing device 200 is configured to communicate.
- a peripheral hardware component e.g., external hard drive, server, external disk drive, etc.
- the hardware processor 300 causes the transceiver 304 to send the proximity signal, which includes the control policy, to the RFID component 210 .
- the control policy identifies which operations, devices, files, or applications can be accessed and/or used by the mobile computing device 200
- the hardware processor 204 is able to control the operations and/or access to devices, files, applications, etc. of the mobile computing device 200 in accordance with the control policy that was received.
- a server can store multiple control policies for individual RFID readers 100 and/or mobile computing devices 200 , and each control policy can be sent to the appropriate RFID reader 100 to which the control policy applies.
- the control policies can be updated on the server, and the updated control policies can be pushed by the server to the appropriate RFID readers 100 .
- an RFID reader receives its intended control policy, it is saved in the memory 302 of the RFID reader 100 where it can subsequently be transmitted to the RFID component 210 of the mobile computing device 200 by the transceiver 304 .
- the proximity signal includes location-related data indicating a current physical location of at least one of the RFID component 210 and the at least one RFID reader 100 .
- the location-related data can identify the reader that transmitted the proximity signal (by name, MAC ID, serial number, code, room name, etc.).
- the location-related data can identify a defined zone (i.e. an area of space in which the mobile computing device 200 is located).
- the location-related data can be geographical coordinates.
- the memory device 208 has recorded thereon a control policy for the mobile computing device 200 , the control policy including identifications of operations of the mobile computing device 200 which are performable based on the physical location of the mobile computing device 200 .
- the hardware processor 204 is configured to compare the location-related data with the control policy, and determine which operations of the mobile computing device 200 are permitted to be performed based on the comparison.
- the hardware processor 204 is configured to control a power state of the mobile computing device 200 .
- Exemplary power states include: power off, power on, sleep mode, hibernate mode, etc.
- the hardware processor 204 is configured to control access to at least one hardware component (e.g., memory device 208 , display interface 202 , camera 216 , microphone 218 , peripheral interface 222 , communications interface 224 , ports 228 , etc.) of the mobile computing device 200 .
- at least one hardware component e.g., memory device 208 , display interface 202 , camera 216 , microphone 218 , peripheral interface 222 , communications interface 224 , ports 228 , etc.
- the hardware processor 204 is configured to enable or disable access to at least one of an executable application 234 stored in the memory device 208 , a file stored in the memory device 208 , at least one operating system 232 of the mobile computing device 200 , and a peripheral hardware component with which the mobile computing device 200 is configured to communicate.
- the transceiver 220 of the RFID component 210 is configured to receive an update signal from at least one RFID reader 100 , the update signal containing an update to at least one of the identifications included in the control policy recorded on the memory device 208 .
- the hardware processor 204 is configured to update the control policy recorded in the memory device 208 in accordance with the update contained in the update signal.
- the location data received from the RFID reader 100 can be encrypted.
- the control policy and/or the proximity signal can be encrypted using an AES-256 GCM algorithm and signed with an ECDSA Curve P-385 signature or with a similar encryption scheme.
- certificates for the ECDSA process are distributed as part of the system configuration and are assigned based on organizational region. Policy signatures can be generated, for example, on the message bytes 0 to 927.
- encryption is performed on the entirety of the message bytes 0 to 1024 after the signature is generated.
- Pre-distributed key material unique to each RFID tag is stored in the device TPM and on a server.
- the key material is hashed with a NONCE that is part of the RFID transmission to generate individual session keys for each of the written policies.
- a single policy can be used for both the UEFI/firmware of the mobile computing device 200 and operating system 232 of the mobile computing device 200 , so both have cryptographic capabilities capable of decrypting the entire message and verifying the signature.
- Key storage can be handled in a TPM 2 . 0 capable TPM.
- all messages of the RFID component 210 except for the NONCE(s) are encrypted, for example using the scheme above.
- the messages used in the present disclosure can be stored on the memory device 212 of the RFID component 210 .
- the memory device 212 is 1,024 bytes in storage size, and stores the control policy along with a CRC16, ECDS curve P-384 generated signature and a 512 bit random NONCE unique to that configuration.
- a system includes the mobile computing device 200 , at least one least one RFID reader 100 , and the RFID component 210 .
- the at least one RFID reader 100 is configured to communicate wirelessly with the RFID component 210 of the mobile computing device 200 and transmit the proximity signal to the RFID component 210 of the mobile computing device 200 when the RFID component 210 is within the predetermined range.
- at least one server is configured to transmit the update signal to the RFID reader 100 for updating the control policy recorded on the memory device 208 when the mobile computing device 200 is in communicative range with the RFID reader 100 .
- a system includes the mobile computing device 200 and at least one RFID reader 100 configured to communicate wirelessly with the RFID component 210 of the mobile computing device 200 and transmit the proximity signal to the RFID component 210 of the mobile computing device 200 when the RFID component 210 is within the predetermined range.
- the memory device 212 has recorded thereon computer-readable instructions and a control policy for the mobile computing device 200 , the control policy including identifications of operations of the mobile computing device 200 which are performable based on the location-related data of the received proximity signal.
- the RFID component 210 includes a hardware processor 214 configured to execute computer-readable instructions recorded on the memory device 212 , compare the location-related data with the control policy, determine which operations of the mobile computing device 200 are permitted to be performed based on the comparison, and generate an operation signal identifying the operations of the mobile computing device 200 which are determined to be performable.
- the RFID component 210 is configured to transmit the operation signal to the hardware processor 204 of the mobile computing device 200 , and the hardware processor 204 is configured to control at least one operation of the mobile computing device 200 in accordance with the operation signal received from the transceiver 220 of the RFID component 210 .
- the hardware processor 204 is configured to control a power state of the mobile computing device 200 .
- the hardware processor 204 is configured to control access to at least one hardware component (e.g., memory device 208 , display interface 202 , camera 216 , microphone 218 , peripheral interface 222 , communications interface 224 , ports 228 , etc.) of the mobile computing device 200 .
- at least one hardware component e.g., memory device 208 , display interface 202 , camera 216 , microphone 218 , peripheral interface 222 , communications interface 224 , ports 228 , etc.
- the hardware processor 204 is configured to enable or disable access to at least one of an executable application 234 stored in the memory device 208 , a file stored in the memory device 208 , at least one operating system 232 of the mobile computing device 200 , and a peripheral hardware component with which the mobile computing device 200 is configured to communicate.
- the transceiver 220 of the RFID component 210 is configured to receive an update signal from at least one RFID reader 100 , the update signal containing an update to at least one of the identifications included in the control policy recorded in the memory device 212 .
- the hardware processor 214 is configured to update the control policy recorded in the memory device 212 in accordance with the update contained in the update signal.
- a system includes, for example, the mobile computing device 200 , at least one RFID reader 100 , and the RFID component 210 .
- the at least one RFID reader 100 is configured to communicate wirelessly with the RFID component 210 of the mobile computing device 200 and transmit the proximity signal to the RFID component 210 of the mobile computing device 200 when the RFID component 210 is within the predetermined range.
- At least one server is configured to transmit the update signal to the at least one RFID reader 100 for updating the control policy recorded in the memory device 208 when the mobile computing device 200 is in communicative range with the at least one RFID reader 100 .
- a method for controlling at least one operation of the mobile computing device 200 includes receiving, by the transceiver 220 of the RFID component 210 , a proximity signal from at least one RFID reader 100 when the RFID component 210 is within a predetermined range of the at least one RFID reader 100 (step S 101 ). The method also includes storing the proximity signal in a memory device 212 of the RFID component 210 (step S 103 ).
- the method further includes executing, by a hardware processor 204 of the mobile computing device 200 , computer-readable instructions tangibly recorded on a memory device 208 of the mobile computing device 200 , the executed instructions controlling at least one operation of the mobile computing device 200 in accordance with the proximity signal received by the transceiver 220 of the RFID component 210 from the at least one RFID reader 100 (step S 105 ).
- a non-transitory computer-readable storage medium (e.g., memory 208 ) stores instructions which, when executed by the hardware processor 204 of the mobile computing device 200 , cause the hardware processor 204 to perform a method for controlling at least one operation of the mobile computing device 200 .
- the method includes receiving a proximity signal from the transceiver 220 of the RFID component 210 communicatively connected to the mobile computing device 200 , the transceiver 220 receiving the proximity signal when the RFID component 210 is within a predetermined range of at least one RFID reader 100 .
- Communicatively connected means, for example, that the mobile computing device 200 and RFID component 210 can communicate with each other by any type of communication means, for example, via a signal transmission means such as a wire, bus, etc.
- the method can also include executing, by the hardware processor 204 of the mobile computing device 200 , the instructions stored on the non-transitory computer-readable storage medium (memory 208 ) of the mobile computing device 200 , the executed instructions controlling the at least one operation of the mobile computing device 200 in accordance with the proximity signal received by the transceiver 220 of the RFID component 210 from the at least one RFID reader 100 .
- a non-transitory computer-readable storage medium (e.g., memory 212 ) stores instructions which, when executed by the hardware processor 214 located in the RFID component 210 communicatively connected to the mobile computing device 200 , cause the hardware processor 214 to perform a method for controlling at least one operation of the mobile computing device 200 .
- the method includes receiving, by the transceiver 220 of the RFID component 210 , a proximity signal when the RFID component 210 is within a predetermined range of at least one RFID reader 100 .
- the method can also include storing the proximity signal in the non-transitory computer-readable storage medium (memory 212 ) of the RFID component 210 , the non-transitory computer-readable storage medium of the RFID component 210 having a control policy for the mobile computing device 200 .
- the control policy including, for example, identifications of operations of the mobile computing device 200 which are performable based on the received proximity signal.
- the method can also include comparing the proximity signal to the control policy, determining which operations of the mobile computing device 200 are permitted to be performed based on the comparison, and generating an operation signal identifying the operations of the mobile computing device 200 which are determined to be performable.
- the method can also include transmitting the operation signal, to a hardware processor 204 of the mobile computing device 200 , to control at least one operation of the mobile computing device 200 in accordance with the operation signal transmitted to the mobile computing device 200 .
- the above-described method can perform any of the operations of the mobile computing device 100 and the RFID component 210 as described herein.
- the above-described non-transitory computer-readable storage medium of the mobile computing device 200 and RFID component 210 can store instructions which cause the respective hardware processor(s) of those devices to respectively perform the operative functions of the mobile computing device 200 and RFID component as described herein.
- FIG. 4 is a flow chart diagram illustrating operations performed by an RFID reader 100 according to an exemplary embodiment of the present disclosure.
- the RFID reader 100 has a hardware processor 300 (e.g., CPU) configured to execute computer-readable software tangibly recorded in a non-transitory computer-readable recording medium 302 of the RFID reader 100 .
- the hardware processor 300 constantly scans for available RFID components 210 (i.e., RFID components 210 in proximity to the RFID reader 100 ).
- An RFID component 210 can be in proximity of the reader when it is, for example, within a radius of several feet or meters.
- the hardware processor 300 finds a RFID component 210 , it begins a secure and signed transaction with the RFID component 210 .
- the RFID component 210 transmits its current configuration and two random NONCE that are used to generated cryptographic keys and signatures.
- One NONCE is used to encrypt and sign the current configuration and location data, and the other is used to encrypt and sign any data that is pushed to the RFID component 210 .
- the RFID reader 100 upon finding a RFID component 210 , checks the current configuration, and validates it against what it thinks the configuration should be. If there is a discrepancy, the hardware processor 300 of the RFID reader 100 pushes the configuration and then re-rereads the tag to verify it was written correctly.
- FIG. 5 is a flow chart diagram illustrating operations performed by the hardware processor 204 of the RFID component 210 according to an exemplary embodiment of the present application.
- the RFID component 210 is a passive tag with an active low power processor enabling cryptographic functionality.
- the RFID component 210 stores its current configuration (e.g., control policy) and two NONCEs for the RFID reader 100 to read. If the RFID component 210 receives an updated configuration from the RFID reader 100 , it verifies the signature, decrypts the configuration and pushes it to the mobile computing device 200 . If the mobile computing device 200 requests the current configuration at any point, it will also push the configuration.
- FIG. 6 is a flow chart diagram illustrating operations performed by the hardware processor 204 of the mobile computing device 200 according to an exemplary embodiment of the present disclosure.
- the hardware processor 204 of the mobile computing device 200 executes a software program dedicated to interfacing with the RFID component 210 .
- the execution of this software monitors any pushed configurations from the RFID component 210 , decrypts them, and checks the signatures on them before setting up the policy locally on the mobile computing device 200 .
- the mobile computing device 200 is started (i.e., powered on), on boot the software requests the current status (e.g., control policy) from the RFID component 210 to set the initial boot policy.
- the current status e.g., control policy
- FIG. 7 is a diagram illustrating exemplary scenarios according to the present disclosure in which the mobile computing device 200 (abbreviated as “host”) is outside an allowed area, enters an unsecured allowed area, enters a secured allowed area, and leaves an allowed area. For each of these areas, FIG. 7 illustrates the operations performed by the RFID reader 100 (top block), the RFID component 210 (middle block) and the hardware processor 204 of the mobile computing device 200 (lower block) executing the above-described software dedicated to interfacing with the RFID component 210 .
- the RFID reader 100 top block
- the RFID component 210 middle block
- the hardware processor 204 of the mobile computing device 200 lower block
- the application providing method and system can be implemented in any number of ways as discussed above, or as will become apparent to those skilled in the art after reading this disclosure. These embodiments, as well as variations and modifications thereof, which will occur to those skilled in the art, are encompassed by the application providing method and system. Hence, the scope of the application providing method and system is limited only by the metes and bounds as articulated in the claims appended hereto.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Toxicology (AREA)
- General Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Software Systems (AREA)
- Artificial Intelligence (AREA)
- Electromagnetism (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computing Systems (AREA)
- Bioethics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
- Near-Field Transmission Systems (AREA)
Abstract
A mobile computing device, including: a first memory device having first computer-readable instructions tangibly recorded thereon; a first hardware processor configured to execute the first computer-readable instructions recorded on the first memory device; and an RFID component that includes a transceiver configured to receive a proximity signal from at least one RFID reader when the RFID component is within a predetermined range of the at least one RFID reader, and a second memory device configured to store the proximity signal, wherein the first hardware processor is configured to, upon executing the instructions recorded on the first memory device, control at least one operation of the mobile computing device in accordance with the proximity signal received by the transceiver of the RFID component from the at least one RFID reader.
Description
- This application is a continuation of application Ser. No. 14/858,351, filed on Sep. 19, 2015, which claims the benefit of U.S. Provisional Application No. 62/052,321, filed on Sep. 18, 2014, the contents of which are incorporated herein by reference in their entirety.
- The present disclosure relates to a system and method for enabling and controlling the operation and/or execution of certain hardware and software components of a mobile computing device according to information obtained based on the use of radio frequency identification (RFID).
- Known RFID implementations are built around the concept of tracking the physical location of an asset (e.g., a product such as a mobile computing device) having an RFID tag affixed thereto. The RFID tag is read by a radio frequency (RF) reader. In this scenario, the asset is not self-aware of its RFID-based location as all location information is exchanged between the RFID tag and the RFID reader(s).
- An exemplary embodiment of the present disclosure provides a mobile computing device, including: a first memory device having first computer-readable instructions tangibly recorded thereon; a first hardware processor configured to execute the first computer-readable instructions recorded on the first memory device; and an RFID component that includes a transceiver configured to receive a proximity signal from at least one RFID reader when the RFID component is within a predetermined range of the at least one RFID reader, and a second memory device configured to store the proximity signal, wherein the first hardware processor is configured to, upon executing the instructions recorded on the first memory device, control at least one operation of the mobile computing device in accordance with the proximity signal received by the transceiver of the RFID component from the at least one RFID reader.
- An exemplary embodiment of the present disclosure provides a method for controlling at least one operation of a mobile computing device, the method including: receiving, by a transceiver of an RFID component, a proximity signal from at least one RFID reader when the RFID component is within a predetermined range of the at least one RFID reader; storing the proximity signal in a first memory device of the RFID component; and executing, by a first hardware processor of the mobile computing device, first computer-readable instructions tangibly recorded on a second memory device of the mobile computing device, the executed instructions controlling the at least one operation of the mobile computing device in accordance with the proximity signal received by the transceiver of the RFID component from the at least one RFID reader.
- An exemplary embodiment of the present disclosure provides a non-transitory computer-readable storage medium storing instructions which, when executed by a hardware processor of a mobile computing device, cause the hardware processor to perform a method for controlling at least one operation of the mobile computing device, the method including: receiving a proximity signal from a transceiver of an RFID component communicatively connected to the mobile computing device, the transceiver receiving the proximity signal when the RFID component is within a predetermined range of at least one RFID reader; and executing, by the hardware processor of the mobile computing device, the instructions stored on the non-transitory computer-readable storage medium of the mobile computing device, the executed instructions controlling the at least one operation of the mobile computing device in accordance with the proximity signal received by the transceiver of the RFID component from the at least one RFID reader.
- An exemplary embodiment of the present disclosure provides a non-transitory computer-readable storage medium storing instructions which, when executed by a hardware processor located in an RFID component communicatively connected to a mobile computing device, cause the hardware processor to perform a method for controlling at least one operation of the mobile computing device, the method including: receiving, by a transceiver of the RFID component, a proximity signal when the RFID component is within a predetermined range of at least one RFID reader; storing the proximity signal in the non-transitory computer-readable storage medium of the RFID component, the non-transitory computer-readable storage medium of the RFID component having a control policy for the mobile computing device, the control policy including identifications of operations of the mobile computing device which are performable based on the received proximity signal; comparing the proximity signal to the control policy, determining which operations of the mobile computing device are permitted to be performed based on the comparison, and generating an operation signal identifying the operations of the mobile computing device which are determined to be performable; and transmitting the operation signal, to a second hardware processor of the mobile computing device, to control at least one operation of the mobile computing device in accordance with the operation signal transmitted to the mobile computing device.
- These and other features and advantages of particular embodiments of the system and method for location-based security will now be described by way of exemplary embodiments to which they are not limited.
- The scope of the present disclosure is best understood from the following detailed description of exemplary embodiments when read in conjunction with the accompanying drawings. The following figures are included in the drawings.
-
FIG. 1 illustrates a diagram of a system architecture that may be employed in accordance with an exemplary embodiment. -
FIG. 2 is a block diagram illustrating the hardware architecture of a mobile computing device in accordance with an exemplary embodiment. -
FIG. 3 is a block diagram illustrating the architecture of a RFID reader in accordance with an exemplary embodiment. -
FIG. 4 is a flow chart illustrating a method according to an exemplary embodiment. -
FIG. 5 is a flow chart illustrating a method according to an exemplary embodiment. -
FIG. 6 is a flow chart illustrating a method according to an exemplary embodiment. -
FIG. 7 is a chart illustrating exemplary functions performed by the devices of the system. -
FIG. 8 is a block diagram illustrating an exemplary architecture using a hypervisor. -
FIG. 9 is a block diagram illustrating an exemplary architecture using a hypervisor. -
FIG. 10 is a flow chart illustrating a method according to an exemplary embodiment. - Further areas of applicability of the present disclosure will become apparent from the detailed description provided hereinafter. It should be understood that the detailed description of exemplary embodiments is intended for illustration purposes only and is, therefore, not intended to necessarily limit the scope of the disclosure.
- This description provides exemplary embodiments only, and is not intended to limit the scope, applicability or configuration of the mobile computing device, system, and method for location-based security of the present disclosure. Rather, the ensuing description of the embodiments will provide those skilled in the art with an enabling description for implementing embodiments of the mobile computing device, system, and method of the present disclosure. Various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the disclosure as set forth in the appended claims. Thus, various embodiments may omit, substitute, or add various procedures or components as appropriate. For instance, it should be appreciated that in alternative embodiments, the methods may be performed in an order different than that described, and that various steps may be added, omitted or combined. Also, features described with respect to certain embodiments may be combined in various other embodiments. Different aspects and elements of the embodiments may be combined in a similar manner.
- With reference to
FIGS. 1 and 2 , exemplary embodiments of the present disclosure provide a system and method of location-based security, in which RFID components 210 (e.g., RFID tags) removably or fixedly affixed to amobile computing device 200 comprise microcontrollers (e.g., at least one hardware processor), and the communications infrastructure 206 (e.g., internal and external serial buses) ofmobile computing devices 200 exchange location information between theRFID components 210 and the firmware and operating system(s) 232 of themobile computing device 200. As used herein, amobile computing device 200 includes at least onehardware processor 204 configured to execute computer-readable programs and anoperating system 232 tangibly recorded on a non-transitory computer-readable recording medium (“memory”) 208 (e.g., ROM, hard disk drive, optical memory, flash memory, etc.). Examples of amobile computing device 200 include a laptop, tablet computer, smartphone, etc. as known in the art. -
FIG. 1 is a block diagram of components of a system for location-based security according to an exemplary embodiment of the present disclosure. InFIG. 1 , themobile computing device 200 is shown as having anRFID component 210 affixed thereto. TheRFID component 210 may be removably or fixedly affixed to themobile computing device 200. For example, theRFID component 210 may be comprised within the housing containing the electronic circuitry of themobile computing device 200. In an exemplary embodiment, theRFID component 210 may have itsown hardware processor 214 separate from the hardware processor(s) of themobile computing device 200. In addition, theRFID component 210 has its own non-transitory memory 212 (e.g., ROM, hard disk drive, optical memory, flash memory, etc.) separate from thememory 208 of themobile computing device 200, and atransceiver 220. In an exemplary embodiment, theRFID component 210 does not have itsown hardware processor 214, but contains thememory 212 and thetransceiver 220. TheRFID component 210 may be passive, active, or battery-assisted passive. Anactive RFID component 210 has an on-board battery and periodically transmits a signal containing a data message (the message can include, e.g., identification information of the RFID component, etc.). A battery-assistedpassive RFID component 210 has a small battery on board and is activated when in the presence of anRFID reader 100. Apassive RFID component 210 is cheaper and smaller because it has no battery; instead, theRFID component 210 uses the radio energy transmitted by theRFID reader 100. TheRFID component 210 contains at least two parts: an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, collecting DC power from the incident reader signal, and other specialized functions; and a transceiver 220 (e.g., antenna) for receiving and transmitting the signal. In an exemplary embodiment, thetransceiver 220 can include two antennas in different polarizations such as linear and circular or horizontal and vertical. A single antenna can also be used. TheRFID component 210 can operate, for example, in a frequency range between 860 and 960 MHz. The sensitivity of the antenna is important to the operation of theRFID component 210, and a minimum receive gain of the antenna greater than −2 dB should be maintained to ensure proper operation. In an exemplary embodiment, the antenna provides a roughly omni-directional radiation pattern. Due to regional banding of the ˜900 MHz ISM frequency space, the antenna(s) may be regionally designed. For instance, the North American ISM band is 902-928 MHz. With a transmitter at 28 dBm complying with FCC and UHF RFID Gen2 Specifications, this should yield a free space range of approximately 20 meters. - The
RFID component 210 information (i.e. tag information) is stored in a non-volatile memory, e.g.,memory 212. TheRFID component 210 includes either fixed or programmable logic for processing the transmission and sensor data, respectively. In an exemplary embodiment, theRFID component 210 includes an Impinj MonzaX-8K Dura RFID integrated circuit or similar integrated circuit.FIG. 1 illustrates only oneRFID reader 100 andRFID component 210 for clarity of illustration. However, it is to be understood thatseveral RFID readers 100 may be equipped in a room or other area to which the mobile computing device may be carried. AnRFID reader 100 transmits a radio signal, which may be encoded, to interrogate theRFID component 210. TheRFID component 210 receives the message from theRFID reader 100 and then responds with its identification information.FIG. 3 shows an exemplary architecture of anRFID reader 100. TheRFID reader 100 contains anon-transitory memory device 302 that can store the proximity signal (which can include the location data and/or a control policy), a hardware processor (e.g., CPU) 300, and atransceiver 304. - The RFID reader(s) 100 send a proximity signal (e.g., location-related information includes, for example, geographic coordinates, configured zones, and/or proximity information)) to the
RFID component 210 embedded within or affixed to themobile computing device 200, indicating the defined physical location of the RFID reader(s) 100 and/or themobile computing device 200. The location information can be transmitted to theRFID component 210 while themobile computing device 200 is in both the powered-on and powered-off states. The message stored in the RFID component'smemory 212 is accessed by thehardware processor 214 of theRFID component 210. Thehardware processor 214 serves three functions: 1) processes the location information provided by theRFID component 210 against corresponding control or management policies to determine the appropriate power state for themobile computing device 200; 2) communicate with the power controls of themobile computing device 200 to manage power states (e.g., force power off, enable power on, and disable power on); and 3) pass the location information to the mobile computing device'sserial buses 206. In an exemplary embodiment, theRFID reader 100 can adjust its transmission frequency to avoid standard frequencies. -
FIG. 2 is a block diagram illustrating amobile computing device 200 architecture in accordance with an exemplary embodiment. A person having ordinary skill in the art may appreciate that embodiments of the disclosed subject matter can be practiced with various computer system configurations, including multi-core multiprocessor systems, minicomputers, mainframe computers, computers linked or clustered with distributed functions, as well as pervasive or miniature computers that may be embedded into virtually any device. For instance, at least one processor device and a memory may be used to implement the above described embodiments. - A hardware processor device as discussed herein may be a single hardware processor, a plurality of hardware processors, or combinations thereof. Hardware processor devices may have one or more processor “cores.” The terms “computer program medium,” “non-transitory computer readable medium,” and “computer usable medium” as discussed herein are used to generally refer to tangible media such as a
memory device 208, amemory device 212, and a memory device 303. - Various embodiments of the present disclosure are described in terms of this exemplary
mobile computing device 200. After reading this description, it will become apparent to a person skilled in the relevant art how to implement the present disclosure using other computer systems and/or computer architectures. Although operations may be described as a sequential process, some of the operations may in fact be performed in parallel, concurrently, and/or in a distributed environment, and with program code stored locally or remotely for access by single or multi-processor machines. In addition, in some embodiments the order of operations may be rearranged without departing from the spirit of the disclosed subject matter. -
Hardware processor 204 may be a special purpose or a general purpose processor device.Hardware processor 214 may be a special purpose or a general purpose processor device. Similarly,hardware processor 300 may be a special purpose or a general purpose processor device. Thehardware processor device 204 may be connected to acommunication infrastructure 206, such as a bus, message queue, network, multi-core message-passing scheme, etc. The network may be any network suitable for performing the functions as disclosed herein and may include a local area network (LAN), a wide area network (WAN), a wireless network (e.g., Wi-Fi), a mobile communication network, a satellite network, the Internet, fiber optic, coaxial cable, infrared, radio frequency (RF), or any combination thereof. Other suitable network types and configurations will be apparent to persons having skill in the relevant art. Themobile computing device 200 may also include a memory 208 (e.g., random access memory, read-only memory, etc.), and may also include amemory 212. Thememory 208 and thememory 212 may be read from and/or written to in a well-known manner. In an embodiment, thememory 208 and the memory 212 (and memory 302) may be non-transitory computer readable recording media. - Data stored in the mobile computing device 200 (e.g., in the
memory 208 and the memory 212) may be stored on any type of suitable computer readable media, such as optical storage (e.g., a compact disc, digital versatile disc, Blu-ray disc, etc.), magnetic tape storage (e.g., a hard disk drive), or solid-state drive. Anoperating system 232, one ormore applications 234, and one ormore hypervisors 236 can be stored in thememory 208. - In an exemplary embodiment, the data may be configured in any type of suitable database configuration, such as a relational database, a structured query language (SQL) database, a distributed database, an object database, etc. Suitable configurations and storage types will be apparent to persons having skill in the relevant art.
- The
mobile computing device 200 may also include acommunications interface 224. Thecommunications interface 224 may be configured to allow software and data to be transferred between themobile computing device 200 and external devices. Exemplary communications interfaces 224 may include a modem, a network interface (e.g., an Ethernet card), a communications port, a PCMCIA slot and card, etc. Software and data transferred via thecommunications interface 224 may be in the form of signals, which may be electronic, electromagnetic, optical, or other signals as will be apparent to persons having skill in the relevant art. The signals may travel via acommunications path 226, which may be configured to carry the signals and may be implemented using wire, cable, fiber optics, a phone line, a cellular phone link, a radio frequency link, etc. - Computer program medium and computer usable medium may refer to memories, such as the
memory 208 and thememory 212, which may be memory semiconductors (e.g., DRAMs, etc.). These computer program products may be means for providing software to themobile computing device 200. Computer programs (e.g., computer control logic) may be stored in thememory 208 and/or thememory 212. Computer programs may also be received via thecommunications interface 224. Such computer programs, when executed, may enablemobile computing device 200 to implement the present methods as discussed herein. In particular, the computer programs, when executed, may enablehardware processor device 204 to implement the method illustrated byFIGS. 4-6 and 10 , or similar methods, as discussed herein. Accordingly, such computer programs may represent controllers of themobile computing device 200. Where the present disclosure is implemented using software, the software may be stored in a computer program product or non-transitory computer readable medium and loaded into themobile computing device 200 using a removable storage drive orcommunications interface 224. - The
mobile computing device 200 may also include various hardware devices, such as acamera 216, amicrophone 218, aperipheral interface 222, and input/output ports 228 such as USB, firewire, thunderbolt ports, etc. As described in greater detail below, theRFID component 210 may be located within and integrated with themobile computing device 200, or theRFID component 210 can be external to themobile computing device 200 and connected thereto by a signal transmission means such as a wire(s), wireless communications, etc. - Lastly, the
mobile computing device 200 may also include adisplay interface 202 that outputs display signals to adisplay unit 230, e.g., LCD screen, plasma screen, LED screen, DLP screen, CRT screen, etc. - According to an exemplary embodiment, the location information provided through the mobile computing device's
buses 206 can be integrated with either ahypervisor 236 or anative operating system 232 using a device driver. -
Hypervisors 236 allow for the control of hardware of themobile computing device 200 and guest virtual machines. Location-based security can be integrated in the hypervisor control domain directly or be installed as a guest virtual machine that interfaces with the hypervisor control domain. - Location-based security can be configured with rules to manage the hypervisor control domain using the desired automated response associated with various defined locations. Virtual machines, network interface cards, device power, USB ports, cameras, microphones, and other device hardware can be enabled or disabled based on defined policy rules.
- The
hypervisor 236 is configured to further distribute the location information to guest virtual machines running on the host machine. - The operating system(s) 232 of the
mobile computing device 200 can receive RFID-based location information from either theserial buses 206 directly, if running as anative operating system 232, or as a pass-through from thehypervisor 236, if running on a guest virtual machine. The location-based security techniques of the present disclosure integrate with the operating system(s) 232 to control access to device hardware and device power states using the defined policy rules. Access to one ormore applications 234 and one or more files stored or running on the operating system(s) 232 are also enabled or disabled using the device management functionality of the location-based security system and method of the present disclosure. A file can be, for example, a document, picture, video, database records, etc. -
FIG. 8 is a block diagram illustrating a hypervisor in accordance with an exemplary embodiment. The present disclosure leverages Hyper-V, for example, as its type 1 hypervisor. The exemplary architecture ofFIG. 8 allows for multiple User VMs to be run in the future. The hypervisor is used to isolate the user VMs from hardware as defined in the control policy, ensure a secure networking environment and cryptographically isolate VMs from each other. In the exemplary architecture ofFIG. 8 , a network VM can encapsulate both of the layers of encryption and have direct access to the network interface. -
FIG. 9 is a block diagram illustrating an exemplary architecture in which virtual systems management (VSM) can be used to dynamically manage hardware available to the User OS (USB devices, webcam, microphone, Bluetooth, etc.) and provide secure networking based on the policy issued over RFID. - In an exemplary embodiment shown in
FIG. 2 , themobile computing device 200 includes thememory device 208 having computer-readable instructions tangibly recorded thereon. Themobile computing device 200 can also include ahardware processor 204 configured to execute the computer-readable instructions recorded on thememory device 208. Themobile computing device 200 can also include anRFID component 210 that includes a transceiver 220 (e.g., an antenna) configured to receive a proximity signal from at least oneRFID reader 100 when theRFID component 210 is within a predetermined range (e.g., within a couple feet or meters) of the at least oneRFID reader 100. The predetermined range can be configured based on (1) the processing and/or telecommunication capabilities of themobile computing device 200,RFID component 210 and/or RFID reader(s) 100, ad/or (2) based on selectable distances (e.g., 10 feet, 20 feet, 30 feet) for specific control objectives, and/or (3) location restrictions such as the physical size of a room, building, or segment of a building (e.g., the second floor of the building). Themobile computing device 200 can also include amemory device 212 configured to store the proximity signal. In an exemplary embodiment, thehardware processor 204 is configured to, upon executing the instructions recorded on thememory device 208, control at least one operation of themobile computing device 200 in accordance with the proximity signal received by thetransceiver 220 of theRFID component 210 from the at least oneRFID reader 100. - In an exemplary embodiment, the
hardware processor 204 is configured to control at least one of: (1) at least one hardware component (e.g.,memory device 208,display interface 202,camera 216,microphone 218,peripheral interface 222,communications interface 224,ports 228, etc.) of themobile computing device 200; (2) at least oneoperating system 232 recorded on thememory device 208; (3) at least onehypervisor 236 recorded on thememory device 208; and (4) at least oneapplication program 234 executable on themobile computing device 200. - In an exemplary embodiment, the proximity signal includes a control policy including identifications of operations of the
mobile computing device 200 that are performable (e.g., by the mobile computing device 200). For example, according to the control policy, thehardware processor 204 is configured to enable or disable access to at least one of anexecutable application 234 stored in thememory device 208, a file stored in thememory device 208, at least oneoperating system 232 of themobile computing device 200, and a peripheral hardware component (e.g., external hard drive, server, external disk drive, etc.) with which themobile computing device 200 is configured to communicate. That is, when themobile computing device 200 is within a certain range of theRFID reader 100, thehardware processor 300 causes thetransceiver 304 to send the proximity signal, which includes the control policy, to theRFID component 210. Because the control policy identifies which operations, devices, files, or applications can be accessed and/or used by themobile computing device 200, thehardware processor 204 is able to control the operations and/or access to devices, files, applications, etc. of themobile computing device 200 in accordance with the control policy that was received. In an exemplary embodiment, a server can store multiple control policies forindividual RFID readers 100 and/ormobile computing devices 200, and each control policy can be sent to theappropriate RFID reader 100 to which the control policy applies. The control policies can be updated on the server, and the updated control policies can be pushed by the server to theappropriate RFID readers 100. When an RFID reader receives its intended control policy, it is saved in thememory 302 of theRFID reader 100 where it can subsequently be transmitted to theRFID component 210 of themobile computing device 200 by thetransceiver 304. - In an exemplary embodiment, the proximity signal includes location-related data indicating a current physical location of at least one of the
RFID component 210 and the at least oneRFID reader 100. In an exemplary embodiment, the location-related data can identify the reader that transmitted the proximity signal (by name, MAC ID, serial number, code, room name, etc.). In an exemplary embodiment, the location-related data can identify a defined zone (i.e. an area of space in which themobile computing device 200 is located). In an exemplary embodiment, the location-related data can be geographical coordinates. - In an exemplary embodiment, the
memory device 208 has recorded thereon a control policy for themobile computing device 200, the control policy including identifications of operations of themobile computing device 200 which are performable based on the physical location of themobile computing device 200. Thehardware processor 204 is configured to compare the location-related data with the control policy, and determine which operations of themobile computing device 200 are permitted to be performed based on the comparison. - In an exemplary embodiment, based on the comparison of the location-related data with the control policy, the
hardware processor 204 is configured to control a power state of themobile computing device 200. Exemplary power states include: power off, power on, sleep mode, hibernate mode, etc. - In an exemplary embodiment, based on the comparison of the location-related data with the control policy, the
hardware processor 204 is configured to control access to at least one hardware component (e.g.,memory device 208,display interface 202,camera 216,microphone 218,peripheral interface 222,communications interface 224,ports 228, etc.) of themobile computing device 200. - In an exemplary embodiment, based on the comparison of the location-related data with the control policy, the
hardware processor 204 is configured to enable or disable access to at least one of anexecutable application 234 stored in thememory device 208, a file stored in thememory device 208, at least oneoperating system 232 of themobile computing device 200, and a peripheral hardware component with which themobile computing device 200 is configured to communicate. - In an exemplary embodiment, the
transceiver 220 of theRFID component 210 is configured to receive an update signal from at least oneRFID reader 100, the update signal containing an update to at least one of the identifications included in the control policy recorded on thememory device 208. Thehardware processor 204 is configured to update the control policy recorded in thememory device 208 in accordance with the update contained in the update signal. - In an exemplary embodiment, at least one of the control policy and the proximity signal are encrypted. Thus, the location data received from the
RFID reader 100 can be encrypted. For example, the control policy and/or the proximity signal can be encrypted using an AES-256 GCM algorithm and signed with an ECDSA Curve P-385 signature or with a similar encryption scheme. In an exemplary embodiment, certificates for the ECDSA process are distributed as part of the system configuration and are assigned based on organizational region. Policy signatures can be generated, for example, on themessage bytes 0 to 927. In an exemplary embodiment, encryption is performed on the entirety of themessage bytes 0 to 1024 after the signature is generated. Pre-distributed key material unique to each RFID tag is stored in the device TPM and on a server. The key material is hashed with a NONCE that is part of the RFID transmission to generate individual session keys for each of the written policies. In an exemplary embodiment, a single policy can be used for both the UEFI/firmware of themobile computing device 200 andoperating system 232 of themobile computing device 200, so both have cryptographic capabilities capable of decrypting the entire message and verifying the signature. Key storage can be handled in a TPM 2.0 capable TPM. In an exemplary embodiment, all messages of theRFID component 210 except for the NONCE(s) are encrypted, for example using the scheme above. - The messages used in the present disclosure can be stored on the
memory device 212 of theRFID component 210. In an exemplary embodiment, thememory device 212 is 1,024 bytes in storage size, and stores the control policy along with a CRC16, ECDS curve P-384 generated signature and a 512 bit random NONCE unique to that configuration. - In an exemplary embodiment, as shown in
FIG. 1 , a system includes themobile computing device 200, at least one least oneRFID reader 100, and theRFID component 210. The at least oneRFID reader 100 is configured to communicate wirelessly with theRFID component 210 of themobile computing device 200 and transmit the proximity signal to theRFID component 210 of themobile computing device 200 when theRFID component 210 is within the predetermined range. In an exemplary embodiment, at least one server is configured to transmit the update signal to theRFID reader 100 for updating the control policy recorded on thememory device 208 when themobile computing device 200 is in communicative range with theRFID reader 100. - In an exemplary embodiment, a system includes the
mobile computing device 200 and at least oneRFID reader 100 configured to communicate wirelessly with theRFID component 210 of themobile computing device 200 and transmit the proximity signal to theRFID component 210 of themobile computing device 200 when theRFID component 210 is within the predetermined range. - In an exemplary embodiment, the
memory device 212 has recorded thereon computer-readable instructions and a control policy for themobile computing device 200, the control policy including identifications of operations of themobile computing device 200 which are performable based on the location-related data of the received proximity signal. - In an exemplary embodiment, the
RFID component 210 includes ahardware processor 214 configured to execute computer-readable instructions recorded on thememory device 212, compare the location-related data with the control policy, determine which operations of themobile computing device 200 are permitted to be performed based on the comparison, and generate an operation signal identifying the operations of themobile computing device 200 which are determined to be performable. TheRFID component 210 is configured to transmit the operation signal to thehardware processor 204 of themobile computing device 200, and thehardware processor 204 is configured to control at least one operation of themobile computing device 200 in accordance with the operation signal received from thetransceiver 220 of theRFID component 210. - In an exemplary embodiment, based on the operation signal received from the
transceiver 220 of theRFID component 210, thehardware processor 204 is configured to control a power state of themobile computing device 200. - In an exemplary embodiment, based on the operation signal received from the
transceiver 220 of theRFID component 210, thehardware processor 204 is configured to control access to at least one hardware component (e.g.,memory device 208,display interface 202,camera 216,microphone 218,peripheral interface 222,communications interface 224,ports 228, etc.) of themobile computing device 200. - In an exemplary embodiment, based on the operation signal received from the
transceiver 220 of theRFID component 210, thehardware processor 204 is configured to enable or disable access to at least one of anexecutable application 234 stored in thememory device 208, a file stored in thememory device 208, at least oneoperating system 232 of themobile computing device 200, and a peripheral hardware component with which themobile computing device 200 is configured to communicate. - In an exemplary embodiment, the
transceiver 220 of theRFID component 210 is configured to receive an update signal from at least oneRFID reader 100, the update signal containing an update to at least one of the identifications included in the control policy recorded in thememory device 212. Thehardware processor 214 is configured to update the control policy recorded in thememory device 212 in accordance with the update contained in the update signal. - In an exemplary embodiment shown in
FIG. 1 , a system includes, for example, themobile computing device 200, at least oneRFID reader 100, and theRFID component 210. The at least oneRFID reader 100 is configured to communicate wirelessly with theRFID component 210 of themobile computing device 200 and transmit the proximity signal to theRFID component 210 of themobile computing device 200 when theRFID component 210 is within the predetermined range. At least one server is configured to transmit the update signal to the at least oneRFID reader 100 for updating the control policy recorded in thememory device 208 when themobile computing device 200 is in communicative range with the at least oneRFID reader 100. - In an exemplary embodiment shown in
FIG. 10 , a method for controlling at least one operation of themobile computing device 200 includes receiving, by thetransceiver 220 of theRFID component 210, a proximity signal from at least oneRFID reader 100 when theRFID component 210 is within a predetermined range of the at least one RFID reader 100 (step S101). The method also includes storing the proximity signal in amemory device 212 of the RFID component 210 (step S103). The method further includes executing, by ahardware processor 204 of themobile computing device 200, computer-readable instructions tangibly recorded on amemory device 208 of themobile computing device 200, the executed instructions controlling at least one operation of themobile computing device 200 in accordance with the proximity signal received by thetransceiver 220 of theRFID component 210 from the at least one RFID reader 100 (step S105). - In an exemplary embodiment, a non-transitory computer-readable storage medium (e.g., memory 208) stores instructions which, when executed by the
hardware processor 204 of themobile computing device 200, cause thehardware processor 204 to perform a method for controlling at least one operation of themobile computing device 200. The method includes receiving a proximity signal from thetransceiver 220 of theRFID component 210 communicatively connected to themobile computing device 200, thetransceiver 220 receiving the proximity signal when theRFID component 210 is within a predetermined range of at least oneRFID reader 100. Communicatively connected means, for example, that themobile computing device 200 andRFID component 210 can communicate with each other by any type of communication means, for example, via a signal transmission means such as a wire, bus, etc. or wirelessly via Wi-Fi, Bluetooth, NFC, etc. The method can also include executing, by thehardware processor 204 of themobile computing device 200, the instructions stored on the non-transitory computer-readable storage medium (memory 208) of themobile computing device 200, the executed instructions controlling the at least one operation of themobile computing device 200 in accordance with the proximity signal received by thetransceiver 220 of theRFID component 210 from the at least oneRFID reader 100. - In an exemplary embodiment, a non-transitory computer-readable storage medium (e.g., memory 212) stores instructions which, when executed by the
hardware processor 214 located in theRFID component 210 communicatively connected to themobile computing device 200, cause thehardware processor 214 to perform a method for controlling at least one operation of themobile computing device 200. The method includes receiving, by thetransceiver 220 of theRFID component 210, a proximity signal when theRFID component 210 is within a predetermined range of at least oneRFID reader 100. The method can also include storing the proximity signal in the non-transitory computer-readable storage medium (memory 212) of theRFID component 210, the non-transitory computer-readable storage medium of theRFID component 210 having a control policy for themobile computing device 200. The control policy including, for example, identifications of operations of themobile computing device 200 which are performable based on the received proximity signal. The method can also include comparing the proximity signal to the control policy, determining which operations of themobile computing device 200 are permitted to be performed based on the comparison, and generating an operation signal identifying the operations of themobile computing device 200 which are determined to be performable. The method can also include transmitting the operation signal, to ahardware processor 204 of themobile computing device 200, to control at least one operation of themobile computing device 200 in accordance with the operation signal transmitted to themobile computing device 200. - The above-described method can perform any of the operations of the
mobile computing device 100 and theRFID component 210 as described herein. Furthermore, the above-described non-transitory computer-readable storage medium of themobile computing device 200 andRFID component 210 can store instructions which cause the respective hardware processor(s) of those devices to respectively perform the operative functions of themobile computing device 200 and RFID component as described herein. -
FIG. 4 is a flow chart diagram illustrating operations performed by anRFID reader 100 according to an exemplary embodiment of the present disclosure. According to an exemplary embodiment, theRFID reader 100 has a hardware processor 300 (e.g., CPU) configured to execute computer-readable software tangibly recorded in a non-transitory computer-readable recording medium 302 of theRFID reader 100. Executing the software, thehardware processor 300 constantly scans for available RFID components 210 (i.e.,RFID components 210 in proximity to the RFID reader 100). AnRFID component 210 can be in proximity of the reader when it is, for example, within a radius of several feet or meters. When thehardware processor 300 finds aRFID component 210, it begins a secure and signed transaction with theRFID component 210. TheRFID component 210 transmits its current configuration and two random NONCE that are used to generated cryptographic keys and signatures. One NONCE is used to encrypt and sign the current configuration and location data, and the other is used to encrypt and sign any data that is pushed to theRFID component 210. TheRFID reader 100, upon finding aRFID component 210, checks the current configuration, and validates it against what it thinks the configuration should be. If there is a discrepancy, thehardware processor 300 of theRFID reader 100 pushes the configuration and then re-rereads the tag to verify it was written correctly. -
FIG. 5 is a flow chart diagram illustrating operations performed by thehardware processor 204 of theRFID component 210 according to an exemplary embodiment of the present application. In an exemplary embodiment, theRFID component 210 is a passive tag with an active low power processor enabling cryptographic functionality. In itsmemory 212, theRFID component 210 stores its current configuration (e.g., control policy) and two NONCEs for theRFID reader 100 to read. If theRFID component 210 receives an updated configuration from theRFID reader 100, it verifies the signature, decrypts the configuration and pushes it to themobile computing device 200. If themobile computing device 200 requests the current configuration at any point, it will also push the configuration. -
FIG. 6 is a flow chart diagram illustrating operations performed by thehardware processor 204 of themobile computing device 200 according to an exemplary embodiment of the present disclosure. Thehardware processor 204 of themobile computing device 200 executes a software program dedicated to interfacing with theRFID component 210. The execution of this software monitors any pushed configurations from theRFID component 210, decrypts them, and checks the signatures on them before setting up the policy locally on themobile computing device 200. When themobile computing device 200 is started (i.e., powered on), on boot the software requests the current status (e.g., control policy) from theRFID component 210 to set the initial boot policy. - The present disclosure provides that different operations can be performed with the
mobile computing device 200 based on the mobile computing device's 200 presence in different areas having different security designations.FIG. 7 is a diagram illustrating exemplary scenarios according to the present disclosure in which the mobile computing device 200 (abbreviated as “host”) is outside an allowed area, enters an unsecured allowed area, enters a secured allowed area, and leaves an allowed area. For each of these areas,FIG. 7 illustrates the operations performed by the RFID reader 100 (top block), the RFID component 210 (middle block) and thehardware processor 204 of the mobile computing device 200 (lower block) executing the above-described software dedicated to interfacing with theRFID component 210. - While various exemplary embodiments of the disclosed system and method have been described above, it should be understood that they have been presented for purposes of example only, not limitations. It is not exhaustive and does not limit the disclosure to the precise form disclosed. Modifications and variations are possible in light of the above teachings or may be acquired from practicing of the disclosure, without departing from the breadth or scope.
- As can be seen above, the application providing method and system can be implemented in any number of ways as discussed above, or as will become apparent to those skilled in the art after reading this disclosure. These embodiments, as well as variations and modifications thereof, which will occur to those skilled in the art, are encompassed by the application providing method and system. Hence, the scope of the application providing method and system is limited only by the metes and bounds as articulated in the claims appended hereto.
Claims (26)
1. A mobile computing device, comprising:
a first memory device having first computer-readable instructions tangibly recorded thereon;
a first hardware processor configured to execute the first computer-readable instructions recorded on the first memory device; and
an RFID component that includes a transceiver and a second memory device, the transceiver of the RFID component being configured to receive a first proximity signal from a first RFID reader when the RFID component is within a predetermined range of the first RFID reader, and to receive a second proximity signal from a second RFID reader when the RFID component is within a predetermined range of the second RFID reader, the second memory device of the RFID component being configured to store the first and second proximity signals,
wherein the first proximity signal includes a first control policy identifying a first set of operations that are performable by the mobile computing device, and the second proximity signal includes a second control policy identifying a second set of operations that are performable by the mobile computing device,
wherein the first hardware processor is configured to, upon executing the instructions recorded on the first memory device, enable the mobile computing device to perform the first set of operations identified in the first control policy when the transceiver of the RFID component receives the first proximity signal while the RFID component is within the predetermined range of the first RFID reader, and to disable the mobile computing device from performing the first set of operations when the transceiver of the RFID component does not receive the first proximity signal while the RFID component is not within the predetermined range of the first RFID reader to receive the first proximity signal, and
wherein the first hardware processor is configured to, upon executing the instructions recorded on the first memory device, enable the mobile computing device to perform the second set of operations identified in the second control policy when the transceiver of the RFID component receives the second proximity signal while the RFID component is within the predetermined range of the second RFID reader, and to disable the mobile computing device from performing the second set of operations when the transceiver of the RFID component does not receive the second proximity signal while the RFID component is not within the predetermined range of the second RFID reader to receive the second proximity signal.
2. The mobile computing device of claim 1 , wherein the first hardware processor is configured to, in enabling or disabling access to the first or second set of operations of the mobile computing device, at least one of:
control at least one hardware component of the mobile computing device;
control at least one operating system recorded on the first memory device;
control at least one hypervisor recorded on the first memory device; and
control at least one application program executable on the mobile computing device.
3. The mobile computing device of claim 1 , wherein the first hardware processor is configured to, based on the first control policy included in the first proximity received from the first RFID reader, enable access to at least one of a first executable application stored in the first memory device, a first file stored in the first memory device, a first operating system of the mobile computing device, and a first peripheral hardware component with which the mobile computing device is configured to communicate, and
wherein the first hardware processor is configured to, based on the second control policy included in the second proximity signal received from the second RFID reader, enable access to at least one of a second executable application stored in the first memory device, a second file stored in the first memory device, a second operating system of the mobile computing device, and a second peripheral hardware component with which the mobile computing device is configured to communicate.
4. The mobile computing device of claim 1 , wherein the first proximity signal includes first location-related data indicating a current physical location of at least one of the RFID component and the first RFID reader, and
wherein the second proximity signal includes second location-related data indicating a current physical location of at least one of the RFID component and the second RFID reader.
5. The mobile computing device of claim 4 , wherein the first hardware processor is configured to compare the first location-related data with the first control policy, and determine which of the first set of operations of the mobile computing device are permitted to be performed based on the comparison, and
wherein the first hardware processor is configured to compare the second location-related data with the first control policy, and determine which of the second set of operations of the mobile computing device are permitted to be performed based on the comparison.
6. The mobile computing device of claim 5 , wherein the first hardware processor is configured to, based on at least one of (i) the comparison of the first location-related data with the first control policy and (ii) the comparison of the second location-related data with the second control policy, enable or disable access to at least one of:
a hardware component of the mobile computing device;
at least one operating system recorded on the first memory device;
at least one hypervisor recorded on the first memory device; and
at least one application program executable on the mobile computing device.
7. The mobile computing device of claim 1 , wherein at least one of the first set of operations and the second set of operations relate to a power state of the mobile computing device,
wherein the first hardware processor is configured to control the power state of the mobile computing device based on the least one of the first set of operations and the second set of operations.
8. The mobile computing device of claim 1 , wherein the first set of operations identified in the first control policy are different from the second set of operations identified in the second control policy.
9. A system comprising:
the mobile computing device of claim 1 ;
a first RFID reader configured to communicate wirelessly with the RFID component of the mobile computing device and transmit the first proximity signal to the RFID component of the mobile computing device when the RFID component is within the predetermined range of the first RFID reader, the first RFID reader being arranged in a first location of a building;
a second RFID reader configured to communicate wirelessly with the RFID component of the mobile computing device and transmit the second proximity signal to the RFID component of the mobile computing device when the RFID component is within the predetermined range of the second RFID reader, the second RFID reader being arranged in a second location distinct from the first location of the building; and
at least one server configured to update the first control policy included in the first proximity signal, and to update the second control policy included in the second proximity signal transmitted by the second RFID reader,
wherein the first set of operations identified in the first control policy are different from the second set of operations identified in the second control policy.
10. The system of claim 9 , wherein the first RFID reader is configured to transmit the first proximity signal containing the updated first control policy to the mobile computing device when the mobile computing device is within the predetermined range of the first RFID reader, and
wherein the second RFID reader is configured to transmit the second proximity signal containing the updated second control policy to the mobile computing device when the mobile computing device is within the predetermined range of the second RFID reader.
11. The system of claim 9 , wherein the second memory device is configured to store the first proximity signal containing the updated first control policy, and to store the second proximity signal containing the updated second control policy, and
wherein the first hardware processor is configured to, upon executing the instructions recorded on the first memory device, enable or disable access to the first set of operations based on the updated first control policy, and to enable or disable access to the second set of operations based on the updated second control policy.
12. The system of claim 9 , wherein the second location is arranged in the building in which the first location is arranged.
13. A mobile computing device, comprising:
a first memory device having first computer-readable instructions tangibly recorded thereon;
a first hardware processor configured to execute the first computer-readable instructions recorded on the first memory device; and
an RFID component that includes a transceiver and a second memory device, the transceiver of the RFID component being configured to receive a first proximity signal from a first RFID reader when the RFID component is within a predetermined range of the first RFID reader, and to receive a second proximity signal from a second RFID reader when the RFID component is within a predetermined range of the second RFID reader, the second memory device of the RFID component being configured to store the first and second proximity signals,
wherein the first proximity signal includes a first control policy identifying a first set of operations that are performable by the mobile computing device, and the second proximity signal includes a second control policy identifying a second set of operations that are performable by the mobile computing device,
wherein the first hardware processor is configured to, upon executing the instructions recorded on the first memory device, disable the mobile computing device from performing the first set of operations identified in the first control policy when the transceiver of the RFID component receives the first proximity signal while the RFID component is within the predetermined range of the first RFID reader, and to enable the mobile computing device to perform the first set of operations when the transceiver of the RFID component does not receive the first proximity signal while the RFID component is not within the predetermined range of the first RFID reader to receive the first proximity signal, and
wherein the first hardware processor is configured to, upon executing the instructions recorded on the first memory device, disable the mobile computing device from performing the second set of operations identified in the second control policy when the transceiver of the RFID component receives the second proximity signal while the RFID component is within the predetermined range of the second RFID reader, and to disable the mobile computing device to perform the second set of operations when the transceiver of the RFID component does not receive the second proximity signal while the RFID component is not within the predetermined range of the second RFID reader to receive the second proximity signal.
14. The mobile computing device of claim 13 , wherein the first hardware processor is configured to, in enabling or disabling access to the first or second set of operations of the mobile computing device, at least one of:
control at least one hardware component of the mobile computing device;
control at least one operating system recorded on the first memory device;
control at least one hypervisor recorded on the first memory device; and
control at least one application program executable on the mobile computing device.
15. The mobile computing device of claim 13 , wherein the first hardware processor is configured to, based on the first control policy included in the first proximity received from the first RFID reader, disable access to at least one of a first executable application stored in the first memory device, a first file stored in the first memory device, a first operating system of the mobile computing device, and a first peripheral hardware component with which the mobile computing device is configured to communicate, and
wherein the first hardware processor is configured to, based on the second control policy included in the second proximity signal received from the second RFID reader, disable access to at least one of a second executable application stored in the first memory device, a second file stored in the first memory device, a second operating system of the mobile computing device, and a second peripheral hardware component with which the mobile computing device is configured to communicate.
16. The mobile computing device of claim 13 , wherein the first proximity signal includes first location-related data indicating a current physical location of at least one of the RFID component and the first RFID reader, and
wherein the second proximity signal includes second location-related data indicating a current physical location of at least one of the RFID component and the second RFID reader.
17. The mobile computing device of claim 16 , wherein the first hardware processor is configured to compare the first location-related data with the first control policy, and determine which of the first set of operations of the mobile computing device are to be disabled based on the comparison, and
wherein the first hardware processor is configured to compare the second location-related data with the first control policy, and determine which of the second set of operations of the mobile computing device are to be disabled based on the comparison.
18. The mobile computing device of claim 17 , wherein the first hardware processor is configured to, based on the comparison of the first location-related data with the first control policy and the comparison of the second location-related data with the second control policy, enable or disable access to at least one of:
a hardware component of the mobile computing device;
at least one operating system recorded on the first memory device;
at least one hypervisor recorded on the first memory device; and
at least one application program executable on the mobile computing device.
19. The mobile computing device of claim 13 , wherein at least one of the first set of operations and the second set of operations relate to a power state of the mobile computing device,
wherein the first hardware processor is configured to control the power state of the mobile computing device based on the least one of the first set of operations and the second set of operations.
20. The mobile computing device of claim 13 , wherein the first set of operations identified in the first control policy are different from the second set of operations identified in the second control policy.
21. A system comprising:
the mobile computing device of claim 13 ;
a first RFID reader configured to communicate wirelessly with the RFID component of the mobile computing device and transmit the first proximity signal to the RFID component of the mobile computing device when the RFID component is within the predetermined range of the first RFID reader, the first RFID reader being arranged in a first location of a building;
a second RFID reader configured to communicate wirelessly with the RFID component of the mobile computing device and transmit the second proximity signal to the RFID component of the mobile computing device when the RFID component is within the predetermined range of the second RFID reader, the second RFID reader being arranged in a second location distinct from the first location of the building; and
at least one server configured to update the first control policy included in the first proximity signal, and to update the second control policy included in the second proximity signal transmitted by the second RFID reader.
22. The system of claim 21 , wherein the first RFID reader is configured to transmit the first proximity signal containing the updated first control policy to the mobile computing device when the mobile computing device is within the predetermined range of the first RFID reader, and
wherein the second RFID reader is configured to transmit the second proximity signal containing the updated second control policy to the mobile computing device when the mobile computing device is within the predetermined range of the second RFID reader.
23. The system of claim 22 , wherein the second memory device is configured to store the first proximity signal containing the updated first control policy, and to store the second proximity signal containing the updated second control policy, and
wherein the first hardware processor is configured to, upon executing the instructions recorded on the first memory device, enable or disable access to the first set of operations based on the updated first control policy, and to enable or disable access to the second set of operations based on the updated second control policy.
24. The system of claim 21 , wherein the second location is arranged in the building in which the first location is arranged.
25. A method for controlling at least one operation of a mobile computing device, which includes a first memory device having first computer-readable instructions tangibly recorded thereon, a first hardware processor configured to execute the first computer-readable instructions recorded on the first memory device, and an RFID component that includes a transceiver and a second memory device, the method comprising:
receiving, by the transceiver of the RFID component, a first proximity signal from a first RFID reader when the RFID component is within a predetermined range of the first RFID reader, the first proximity signal including a first control policy identifying a first set of operations that are performable by the mobile computing device;
receiving, by the transceiver of the RFID component, a second proximity signal from a second RFID reader when the RFID component is within a predetermined range of the second RFID reader, the second proximity signal including a second control policy identifying a second set of operations that are performable by the mobile computing device;
storing, by the second memory device of the transceiver, the first and second proximity signals received by the transceiver;
enabling, by the first hardware processor executing the instructions recorded on the first memory device, the mobile computing device to perform the first set of operations identified in the first control policy when the transceiver of the RFID component receives the first proximity signal while the RFID component is within the predetermined range of the first RFID reader;
disabling, by the first hardware processor executing the instructions recorded on the first memory device, the mobile computing device from performing the first set of operations when the transceiver of the RFID component does not receive the first proximity signal while the RFID component is not within the predetermined range of the first RFID reader to receive the first proximity signal;
enabling, by the first hardware processor executing the instructions recorded on the first memory device, the mobile computing device to perform the second set of operations identified in the second control policy when the transceiver of the RFID component receives the second proximity signal while the RFID component is within the predetermined range of the second RFID reader; and
disabling, by the first hardware processor executing the instructions recorded on the first memory device, the mobile computing device from performing the second set of operations when the transceiver of the RFID component does not receive the second proximity signal while the RFID component is not within the predetermined range of the second RFID reader to receive the second proximity signal.
26. A non-transitory computer-readable storage medium storing instructions which, when executed by a hardware processor of a mobile computing device, cause the hardware processor to perform a method for controlling at least one operation of the mobile computing device, the mobile computing device including a first memory device having first computer-readable instructions tangibly recorded thereon, a first hardware processor configured to execute the first computer-readable instructions recorded on the first memory device, and an RFID component that includes a transceiver and a second memory device, the method comprising:
receiving, by the transceiver of the RFID component, a first proximity signal from a first RFID reader when the RFID component is within a predetermined range of the first RFID reader, the first proximity signal including a first control policy identifying a first set of operations that are performable by the mobile computing device;
receiving, by the transceiver of the RFID component, a second proximity signal from a second RFID reader when the RFID component is within a predetermined range of the second RFID reader, the second proximity signal including a second control policy identifying a second set of operations that are performable by the mobile computing device;
storing, by the second memory device of the transceiver, the first and second proximity signals received by the transceiver;
enabling, by the first hardware processor executing the instructions recorded on the first memory device, the mobile computing device to perform the first set of operations identified in the first control policy when the transceiver of the RFID component receives the first proximity signal while the RFID component is within the predetermined range of the first RFID reader;
disabling, by the first hardware processor executing the instructions recorded on the first memory device, the mobile computing device from performing the first set of operations when the transceiver of the RFID component does not receive the first proximity signal while the RFID component is not within the predetermined range of the first RFID reader to receive the first proximity signal;
enabling, by the first hardware processor executing the instructions recorded on the first memory device, the mobile computing device to perform the second set of operations identified in the second control policy when the transceiver of the RFID component receives the second proximity signal while the RFID component is within the predetermined range of the second RFID reader; and
disabling, by the first hardware processor executing the instructions recorded on the first memory device, the mobile computing device from performing the second set of operations when the transceiver of the RFID component does not receive the second proximity signal while the RFID component is not within the predetermined range of the second RFID reader to receive the second proximity signal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/635,720 US10244347B2 (en) | 2014-09-18 | 2017-06-28 | System and method for location-based security |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201462052321P | 2014-09-18 | 2014-09-18 | |
US14/858,351 US9848291B2 (en) | 2014-09-18 | 2015-09-18 | System and method for location-based security |
US15/635,720 US10244347B2 (en) | 2014-09-18 | 2017-06-28 | System and method for location-based security |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/858,351 Continuation US9848291B2 (en) | 2014-09-18 | 2015-09-18 | System and method for location-based security |
Publications (2)
Publication Number | Publication Date |
---|---|
US20170303131A1 true US20170303131A1 (en) | 2017-10-19 |
US10244347B2 US10244347B2 (en) | 2019-03-26 |
Family
ID=55527041
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/858,351 Active US9848291B2 (en) | 2014-09-18 | 2015-09-18 | System and method for location-based security |
US15/635,720 Active US10244347B2 (en) | 2014-09-18 | 2017-06-28 | System and method for location-based security |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/858,351 Active US9848291B2 (en) | 2014-09-18 | 2015-09-18 | System and method for location-based security |
Country Status (12)
Country | Link |
---|---|
US (2) | US9848291B2 (en) |
EP (1) | EP3195180B1 (en) |
JP (1) | JP2017534958A (en) |
KR (1) | KR20170100473A (en) |
CN (1) | CN107004107A (en) |
AU (1) | AU2015317482B2 (en) |
BR (1) | BR112017004249A2 (en) |
EA (1) | EA201790411A1 (en) |
IL (1) | IL250926B (en) |
SG (1) | SG11201701678XA (en) |
WO (1) | WO2016044717A1 (en) |
ZA (1) | ZA201701503B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10061933B1 (en) * | 2018-01-09 | 2018-08-28 | Booz Allen Hamilton Inc. | System and method for controlling the power states of a mobile computing device |
US10904820B1 (en) * | 2015-12-10 | 2021-01-26 | Massachusetts Mutual Life Insurance Company | Methods and systems for beacon-based management of shared resources |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10314088B2 (en) * | 2014-04-16 | 2019-06-04 | Belkin International, Inc. | Associating devices and users with a local area network using network identifiers |
US10560975B2 (en) | 2014-04-16 | 2020-02-11 | Belkin International, Inc. | Discovery of connected devices to determine control capabilities and meta-information |
US9848291B2 (en) * | 2014-09-18 | 2017-12-19 | Booz Allen Hamilton Inc. | System and method for location-based security |
US9645625B2 (en) * | 2015-02-19 | 2017-05-09 | American Megatrends, Inc. | System and method for power management of computing devices in a virtual desktop infrastructure |
US10917400B1 (en) * | 2016-02-19 | 2021-02-09 | United Services Automobile Association (Usaa) | Online security center |
US9841490B1 (en) | 2017-01-17 | 2017-12-12 | Booz Allen Hamilton Inc. | System and method for detecting movement of a mobile asset and controlling operations of the asset based on its movement |
US10713205B2 (en) * | 2017-02-24 | 2020-07-14 | Digital 14 Llc | Universal serial bus (USB) disconnection switch system, computer program product, and method |
US10701555B1 (en) * | 2019-04-15 | 2020-06-30 | Booz Allen Hamilton Inc. | System and method for control policy retention |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5192947A (en) * | 1990-02-02 | 1993-03-09 | Simon Neustein | Credit card pager apparatus |
US6008727A (en) * | 1998-09-10 | 1999-12-28 | Xerox Corporation | Selectively enabled electronic tags |
US20070164847A1 (en) * | 2006-01-11 | 2007-07-19 | Michael Crawford | System and method for locking electronic devices |
US20140361872A1 (en) * | 2013-06-07 | 2014-12-11 | Research In Motion Limited | Mobile wireless communications device providing near field communication (nfc) unlock and tag data change features and related methods |
US9848291B2 (en) * | 2014-09-18 | 2017-12-19 | Booz Allen Hamilton Inc. | System and method for location-based security |
Family Cites Families (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5517194A (en) * | 1994-02-10 | 1996-05-14 | Racom Systems, Inc. | Passive RF transponder and method |
US5874902A (en) * | 1996-07-29 | 1999-02-23 | International Business Machines Corporation | Radio frequency identification transponder with electronic circuit enabling/disabling capability |
US5821854A (en) * | 1997-06-16 | 1998-10-13 | Motorola, Inc. | Security system for a personal computer |
US6876295B1 (en) * | 1998-12-16 | 2005-04-05 | Symbol Technologies, Inc. | Wireless communication devices configurable via passive tags |
US7034659B2 (en) * | 2002-09-23 | 2006-04-25 | Intermec Ip Corp. | Method and system for limiting use of electronic equipment |
US7446646B2 (en) * | 2003-06-30 | 2008-11-04 | Nokia Corporation | System and method for supporting multiple reader-tag configurations using multi-mode radio frequency tag |
US8333317B2 (en) * | 2003-09-30 | 2012-12-18 | Broadcom Corporation | System and method for authenticating the proximity of a wireless token to a computing device |
JP4140905B2 (en) * | 2004-03-22 | 2008-08-27 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Storage device and program |
US20080009313A1 (en) * | 2004-06-10 | 2008-01-10 | Tomoki Ishii | Mobile Terminal Receiving Data from Rfid Tag and Mobile Terminal Control Policy Identification Method |
US7574732B2 (en) * | 2004-09-29 | 2009-08-11 | Symbol Technologies Inc | Object location based security using RFID |
US7245221B2 (en) | 2004-10-01 | 2007-07-17 | Emc Corporation | Inventory control |
US20060132304A1 (en) * | 2004-12-06 | 2006-06-22 | Cabell Dennis J | Rule-based management of objects |
US7861099B2 (en) | 2006-06-30 | 2010-12-28 | Intel Corporation | Method and apparatus for user-activity-based dynamic power management and policy creation for mobile platforms |
KR101246343B1 (en) * | 2005-09-06 | 2013-03-21 | 엘지전자 주식회사 | A Mobile Phone Equipped with RFID Tag and Thereof Method for Controlling Access of RFID Reader |
US9111157B2 (en) | 2006-08-16 | 2015-08-18 | Insight Holding Group, Inc. | System and method for tracking shopping behavior |
US7706837B2 (en) * | 2006-09-01 | 2010-04-27 | Research In Motion Limited | Disabling operation of a camera on a handheld mobile communication device based upon enabling or disabling devices |
US7769394B1 (en) * | 2006-10-06 | 2010-08-03 | Sprint Communications Company L.P. | System and method for location-based device control |
US8098160B2 (en) * | 2007-01-22 | 2012-01-17 | Cisco Technology, Inc. | Method and system for remotely provisioning and/or configuring a device |
US8269835B2 (en) | 2007-12-07 | 2012-09-18 | International Business Machines Corporation | Modification of turf TV participant decorations based on multiple real-time factors |
US9264231B2 (en) | 2008-01-24 | 2016-02-16 | Intermec Ip Corp. | System and method of using RFID tag proximity to grant security access to a computer |
US8214651B2 (en) | 2008-07-09 | 2012-07-03 | International Business Machines Corporation | Radio frequency identification (RFID) based authentication system and methodology |
US20110050421A1 (en) | 2009-08-28 | 2011-03-03 | Symbol Technologies, Inc. | Systems, methods and apparatus for determining direction of motion of a radio frequency identification (rfid) tag |
US8618913B1 (en) * | 2009-10-19 | 2013-12-31 | Emc Corporation | Radio frequency identification enabled mobile device |
US20110241844A1 (en) * | 2010-03-30 | 2011-10-06 | Bsh Home Appliances Corporation | Appliance including a radio frequency identification (rfid) device and method for two-way communication of dynamic data by the appliance via the rfid device |
US8880100B2 (en) * | 2011-03-23 | 2014-11-04 | Radium, Inc. | Proximity based social networking |
IL214209A0 (en) * | 2011-07-20 | 2012-01-31 | Israel Aerospace Ind Ltd | System and method for location based control of elements of a mobile communication device |
JP5919877B2 (en) * | 2012-02-23 | 2016-05-18 | 日本電気株式会社 | Thin client system, control server, terminal, security control method, and security control program |
JP5895214B2 (en) * | 2012-07-04 | 2016-03-30 | パナソニックIpマネジメント株式会社 | Wireless device |
CN107832615A (en) * | 2012-10-19 | 2018-03-23 | 迈克菲公司 | Place perceives safety |
US9535483B2 (en) | 2012-12-19 | 2017-01-03 | Intel Corporation | Adaptively disabling and enabling sleep states for power and performance |
US20140207974A1 (en) * | 2013-01-19 | 2014-07-24 | Tata Consultancy Services Limited | Systems and methods for managing communication device capabilities |
JP6040794B2 (en) * | 2013-02-06 | 2016-12-07 | 株式会社デンソーウェーブ | Portable information terminal and security system |
CN103324519A (en) | 2013-06-17 | 2013-09-25 | 华为技术有限公司 | Method and device for clearing malicious power consumption applications, and user terminal |
US20150067017A1 (en) | 2013-08-30 | 2015-03-05 | Qualcomm Mems Techologies, Inc. | Method and system for accessing media |
US9311496B1 (en) | 2014-03-25 | 2016-04-12 | Emc Corporation | Privacy screen-based security |
US9786153B2 (en) | 2014-11-26 | 2017-10-10 | Justin London | Multi-modal tracking locator alarm system |
-
2015
- 2015-09-18 US US14/858,351 patent/US9848291B2/en active Active
- 2015-09-18 KR KR1020177006528A patent/KR20170100473A/en unknown
- 2015-09-18 CN CN201580048665.2A patent/CN107004107A/en active Pending
- 2015-09-18 SG SG11201701678XA patent/SG11201701678XA/en unknown
- 2015-09-18 WO PCT/US2015/050928 patent/WO2016044717A1/en active Application Filing
- 2015-09-18 JP JP2017515111A patent/JP2017534958A/en active Pending
- 2015-09-18 EA EA201790411A patent/EA201790411A1/en unknown
- 2015-09-18 EP EP15841532.3A patent/EP3195180B1/en active Active
- 2015-09-18 AU AU2015317482A patent/AU2015317482B2/en active Active
- 2015-09-18 BR BR112017004249A patent/BR112017004249A2/en not_active Application Discontinuation
-
2017
- 2017-02-28 ZA ZA2017/01503A patent/ZA201701503B/en unknown
- 2017-03-05 IL IL250926A patent/IL250926B/en active IP Right Grant
- 2017-06-28 US US15/635,720 patent/US10244347B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5192947A (en) * | 1990-02-02 | 1993-03-09 | Simon Neustein | Credit card pager apparatus |
US6008727A (en) * | 1998-09-10 | 1999-12-28 | Xerox Corporation | Selectively enabled electronic tags |
US20070164847A1 (en) * | 2006-01-11 | 2007-07-19 | Michael Crawford | System and method for locking electronic devices |
US20140361872A1 (en) * | 2013-06-07 | 2014-12-11 | Research In Motion Limited | Mobile wireless communications device providing near field communication (nfc) unlock and tag data change features and related methods |
US9848291B2 (en) * | 2014-09-18 | 2017-12-19 | Booz Allen Hamilton Inc. | System and method for location-based security |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10904820B1 (en) * | 2015-12-10 | 2021-01-26 | Massachusetts Mutual Life Insurance Company | Methods and systems for beacon-based management of shared resources |
US10061933B1 (en) * | 2018-01-09 | 2018-08-28 | Booz Allen Hamilton Inc. | System and method for controlling the power states of a mobile computing device |
US10372923B2 (en) * | 2018-01-09 | 2019-08-06 | Booz Allen Hamilton Inc. | System and method for controlling the power states of a mobile computing device |
Also Published As
Publication number | Publication date |
---|---|
EP3195180A1 (en) | 2017-07-26 |
US20160088432A1 (en) | 2016-03-24 |
WO2016044717A1 (en) | 2016-03-24 |
US9848291B2 (en) | 2017-12-19 |
JP2017534958A (en) | 2017-11-24 |
IL250926B (en) | 2019-06-30 |
EP3195180B1 (en) | 2019-11-20 |
AU2015317482B2 (en) | 2021-04-01 |
CN107004107A (en) | 2017-08-01 |
KR20170100473A (en) | 2017-09-04 |
IL250926A0 (en) | 2017-04-30 |
EA201790411A1 (en) | 2017-07-31 |
BR112017004249A2 (en) | 2017-12-12 |
ZA201701503B (en) | 2018-07-25 |
US10244347B2 (en) | 2019-03-26 |
SG11201701678XA (en) | 2017-04-27 |
AU2015317482A1 (en) | 2017-03-23 |
EP3195180A4 (en) | 2018-04-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10244347B2 (en) | System and method for location-based security | |
US11209815B2 (en) | Drone control registration | |
EP2911077B1 (en) | Method and apparatus for processing biometric information in electronic device | |
US10372923B2 (en) | System and method for controlling the power states of a mobile computing device | |
US11102645B2 (en) | Network registration method of internet of things device, and device therefor | |
US20170255799A1 (en) | Automating Device Testing Using RFID | |
KR20190131712A (en) | A control method of secure module connected to a plurality of processors and electronic apparatus implementing the same | |
US11539399B2 (en) | System and method for smart card based hardware root of trust on mobile platforms using near field communications | |
US20160088476A1 (en) | Electronic device, accessory device, and method of authenticating accessory device | |
US9477917B1 (en) | System and method of context specific identity in a radio frequency identity (RFID) chip | |
KR102490395B1 (en) | Electronic device for sharing a key of external electronic device and method for the same | |
CA2846026A1 (en) | Radio frequency identification notification system | |
CA3075550C (en) | System and method for control policy retention | |
US9774575B2 (en) | System and method for authenticating user by near field communication | |
EP3561666B1 (en) | Mobile device with access rights management | |
KR101505735B1 (en) | Method for Authenticating Near Field Communication Card by using Time Verification | |
KR20160135966A (en) | Processing method of tag information for inferring user situation | |
KR101647124B1 (en) | Right management system for product based on hardware and mehtod performing thereof | |
KR20210010593A (en) | Apparatus and Method for processing biometric information in a electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: BOOZ ALLEN HAMILTON INC., VIRGINIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MYERS, GARY JASON;WELSH, MATTHIAS;KNIGHT, ROBERT WAYNE;AND OTHERS;REEL/FRAME:042846/0812 Effective date: 20150917 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |